Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Size: px
Start display at page:

Download "Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network"

Transcription

1 Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute of Technology Solapur. India. Solapur University, Solapur. ABSTRACT In sensor network a large amount of data need to be collected for future information retrieval. The data centric storage has become an important issue in sensor network. Storage nodes are used in this paper to store and process the collected data. This paper considers the storage node placement problem aiming to place unlimited storage nodes in sensor network to minimize the total energy cost for collecting the raw data and replying queries at the storage nodes. In this paper a strong data access model for placing storage nodes in sensor network is presented. Here we consider an application in which sensor networks provide real time data services to user. The main aim of this paper is to reduce the cost for raw data transfer, query diffusion, query reply by defining the best location of storage nodes in sensor network. Keywords Wireless sensor network, data reduction rate, data storage, data reply, data query, query diffusion. 1. INTRODUCTION One of the key challenges in wireless sensor network is the storage and querying of useful sensor data. The wireless sensor network is built of nodes, where each node is connected to one or more sensors. Sensor networks deployed for different computing applications. Storage is an essential factor of any data centric sensor network application. One of the main challenges in these applications is how to search and store the collected data. The collected data can either be stored in the network sensors, or transmitted back to the sink and stored there for future retrieval. This design is ideal since data are stored in a central place for permanent access. Placing unlimited storage nodes is related to the sensor network. Query is the most important part of sensor network since in aspect sensor network provides the information about environmental condition to the end user. The main aim of this paper is to minimize the total energy cost and data query by accurately deploying the storage nodes in sensor network. Spread to every sensor node by flooding messages. Sensors nodes send data back to the sink in the reverse direction of query messages. Those methods do not consider the storage concern in sensor networks. Data-centric storage schemes [4, 5, 6] store data to different places in sensor networks according to different data types. In [5, 6], the authors propose a data-centric storage scheme for sensor networks, which inherits ideas from distributed hash table. The home site of a data is obtained by applying a hash function on the data type LEACH [7] is a clustering based routing protocol, in which cluster heads can fuse the data collected from its neighbors to reduce communication cost to the sink. LEACH has a similar structure accomplished by us, having cluster heads aggregate and forward data to the sink. However, LEACH aims to reduce data transmission by aggregating data; it does not address storage problem in sensor networks PRESTO [8] is a recent research works on storage architecture for wireless sensor networks. A proxy layer is introduced between sensor nodes and user terminals and proxy nodes can cache previous query responses. When a query arrives in a proxy node, it first checks if the cached data can satisfy the query before forwarding the query to other nodes. Compared with the storage nodes in this paper, des in PRESTO have no resource constraints in term of computation, power, storage and communication. It is a more familiar storage architecture that does not take the characteristics of data generation or query into consideration. 3. Proposed Data Access Model In this paper, we consider an application in which sensor networks provide real-time data services to users. A sensor network is given with one defined sensor identified as the sink (or base station), access point and many normal sensors, each of which generates (or collects) data from its environment. Users or application program specify the data they need by submitting queries to the sink and they are usually interested in the latest readings generated by the sensors. To reply to queries, one typical solution, shown in fig.1, is the sinks have all the data. 2. RELATED WORK There has been a lot of prior research work on data querying models in sensor network. In early models [1, 2, 3], query is 11

2 Figure 1: Data Access Model with Storage des and Forwarding des. This requires each sensor to send its readings back to the Access point immediately every time it produces new data. Transferring all raw data could be very expensive and is not always required. Alternatively, allow sensors node to hold their raw data and to be aware of the different queries, then raw data can be managed to contain only the readings that users are interested in and the reduced reply size, instead of the whole raw data readings, can be send back to the sink. This design is illustrated in Fig. 1, where the black sensor nodes, called storage nodes, are allowed to hold raw data. The base station diffuses queries to the access point by broadcasting to the sensor network and then access point Broadcast the queries to storage sensors and these storage sensors reply to the queries by sending the processed data back to the storage node. Compared to the earlier solution, this approach reduces cost of the raw data transfer because some raw data transmissions are replaced by query reply. On the other hand, this scheme incurs an extra query diffusion cost (as figured by the dashed arrows). In this paper, we are interested in vital designing a data access model to minimize energy cost associated with query diffusion, raw data transfers, and query replies. Access Point: When the user fires the query on the sink, sink forward the query Request to the access point. Access point broadcast the query to sensor nodes. When the query arrived at storage nodes they forward the raw data back to the access point and then access point obtain the result and forward the data to the sink.. First formally define two types of sensors (or nodes): Storage nodes: These types of nodes have much larger storage capacity than normal sensor nodes. In the data access model as shown in fig.1, they store all the data received from other nodes or generated by themselves. Storage node does not send anything until queries arrive. 12

3 According to the query specification, they receive the results needed from the raw data they are holding and then return the results back to the base station. The base station itself is considered as a storage node. Forwarding nodes: These types of nodes are regular sensors and they always forward the data received from other nodes or generated by themselves along a path towards the sink. The outgoing data are kept intact and the forwarding operation continues until the data reach a nearest storage node. The raw data forwarding operation is independent of queries and there is no data processing at forwarding nodes. 4. Placing Unlimited Number of Storage nodes Let i be any node in the communication tree and Ti be the subtree rooted at i. first use Ti to denote the number of des in Ti. then define E(i) to be the energy cost incurred at i per time unit, which consist, the cost for raw data transfer i to its parent if i is a forwarding node, the cost for query diffusion if i has storage nodes as its descendants, and the cost for query reply if i is a storage node or has a storage descendant. To define E(i) mathematically we need to consider several possible cases. Case I: i is a forwarding node and there are no storage nodes in Ti. All raw data generated by the nodes in Ti have to be forwarded to the parent of i and there is no query diffusion cost. So E(i) = Ti Rd Sd. Case II: i is a storage node and there are no other storage nodes in Ti. The latest readings of all raw data generated by the nodes in Ti are processed at node i and the reduced reply size will be β Ti sd. de i sends the reply to its parent when queries arrive. So E(i) = Rq β Ti Sd. Case III. i is a storage node and there is at least one other storage node in Ti. In addition to the cost for query reply as defined in Case II, i also incurs a cost for query diffusion that is implemented by broadcasting to its children. So E(i) = Rq β Ti Sd + Bi Rq Sq Case IV. i is a forwarding node and there is at least one Storage node in Ti. This is the case where all three types of cost (for query diffusion, raw data transfer, and query reply) are present. Among the Ti 1 descendants of i, let d1 be the number of forwarding descendants without any storage nodes on their paths to i and d2 be the number of storage descendant s or forwarding descendants with at least one storage node on their paths to i. Obviously, d1 + d2 = Ti 1. So E(i) = (d1 + 1)Rd Sd + Bi Rq Sq + Rq βd2 Sd 1: make the root a storage node 2: if βrq Rd then 3: make all non-root nodes forwarding nodes and return 4: end if 5: for all leaves i do 6::make i a storage node 7: e*[i]=rqβsd 8: ef[i]=rdsd 9: end for 10: for all remaining nodes i do 11: make i a storage node 12: min1=rqβ Ti Sd+BiRqSq+ j ci e*[j] 13: min2=rqβ Ti Sd+ j ci ef[j] 14: e*[i]=min{min1,min2} 15: ef[i]= Ti RdSd+ j ci ef[j] 16: if min1 min2 then 17: change each descendent of i that is a storage node to a forwarding node International Journal of Computer Applications ( ) 18: end if 19: end for Algorithm 1: Placing unlimited storage nodes Algorithm relies on following lemma. Lemma 1.Given a node i and its sub tree Ti. If βrq Rd, then i must be a forwarding node to minimize e(i).if βrq Rd, then i must be a storage node to minimize e(i). Proof: First compare the two trees based on their energy cost, which are equivalent in every aspect except that the first tree s root is a forwarding node and the second tree s root is a storage node. Let e1 and e2 be the two trees based on their energy cost. Comparing the two trees using the energy cost of individual nodes, one by one, observe that any two non- root nodes in the same position of the trees must have the similar energy cost. The only change is the energy cost of the roots. Let E1 and E2 be the energy cost of the roots in the two trees, respectively. Therefore, e1 e2 = E1 E2. Here consider two cases. First, if both root have no storage descendants, then according to the four different case definition of energy cost (case I and II). E1-E2 = Ti Rd Sd -Rqβ Ti Sd = Ti Sd(Rd-βRq) Second, if both roots have at least one storage descendant, then according to the four different case definition of energy cost (Cases III and IV). E1-E2=((d1+1)RdSd+BiRqSq+Rqβd2Sd) Rqβ Ti Sd+BiRqSq) = (d1+1)sd(rd-βrq). From the above lemma, conclude that if βrq Rd then every node (except for the root/sink, which is always a storage node) in the sensor network must be a forwarding node to minimize the energy cost. The query diffusion cost can be eliminated if every subtrees of i has only forwarding nodes, i.e., E(i) = Rq β Ti Sd.(See Cases III and II in the four-case definition of E(i)) Thus, the minimum energy cost of the tree rooted at i should be derived from the better of these two scenarios For a tree Ti rooted at i, let Ci be the set of children of i. Let e*(i) be the minimum energy cost of Ti. If Ci is empty, i.e., i is a leaf, then i must be a storage node to achieve its minimum energy cost. So e*(i) = Rq βsd. If Ci is not empty, then for any j Ci, let ef (j) be the energy cost of Tj when all nodes in Tj are forwarding nodes. So e (i) = min {Rq β Ti Sd + Bi Rq Sq + j ci e (j), Rq β Ti Sd + j ci ef (j) }. From the design of the algorithm, we also observe that every node starts as a storage node and that once it is changed to a forwarding node, it will never be changed back. Therefore, all its descendants are replaced to forwarding nodes as well. it is impossible for a forwarding node to have a storage node descendant. Likewise, it is impossible for a storage node to have a forwarding node ancestor. Algorithm1 finds the optimal placement of storage node for the case βrq Rd.Assume that n nodes in the tree T are labeled using the post order. A table e*[1...n] is used to hold the minimum energy cost of all sub trees rooted at node i = 1... n. So at the end of the computation, e*[n] will hold the minimum energy cost of T. Second table also maintains ef[1..n] which records the energy cost of all sub trees when all nodes in each sub tree are forwarding nodes. In the algorithm, line 5-9 compute the e* and ef entries for all leaves and lines compute the e* and ef entries for the remaining nodes 13

4 Start Storage node 1 1 e*[i]= RqβSd Make root as storage node All remaining nodes i ef[i]= RdSd Storage node 2 Exit Input Rd,Rq,Sd,Sq,β i=1 i=i+1 Storage node 2 If βrq Rd Make i a storage node 2 min 1= Rqβ Ti Sd + BiRqSq + j ci e*[j] min 2= Rqβ Ti Sd+ j ci ef[j] e*[i]=min{min1,min2} Make all non root nodes forwarding nodes If min 1 min2 ef[i]= Ti RdSd+ j ci ef[j] Exit All leaves i=1 Storage node 1 i=i+1 Change each descendent of i that is storage to forwarding node Make i a storage node 1 Stop Figure 2: Placing unlimited number of storage nodes flow chart. 14

5 In this paper we consider the problem of storage node placement in sensor network where the number of storage node is unlimited. Table 1 lists the notations, which we have used in this algorithm. Table 1: tations Fig.3 indicates the comparison of unlimited storage nodes with Storage nodes vs. Total energy cost and other schemes. The xgraph values are taken from observations made from Algorithm 1.Where the graph of the average energy cost of unlimited storage nodes is indicated as red color. Rd:-Data generation rate Sd : Size of each data ci : the number of node i s children Rq: User query rate Sq : size of each query message n: total number of sensors e(i):energy cost of all the nodes in Ti. E(i): energy cost of node i β: Data reduction rate Ti : the subtree rooted at node i 5. RESULTED GRAPHS In our simulation settings, we consider a network of sensor deployed on a disk of radius 5 with the sink placed at the center. One hundred and one sensor nodes(n=101)are deployed to the field randomly. After all nodes are deployed in a routing tree rooted at the sink is constructed by broadcasting a message from the sink to all the nodes in the network. Therefore, for a certain set of parameters, we conduct several independent trials and the total average energy cost is used in the following analysis and comparison. We set the following parameters in our simulations: Rd=0.5,Rq=0.4,Sd=512,Sq=512.we evaluate the energy cost by varying the data reduction rate β.to simplify the description, we set Rd,Rq,Sd,Sq and only compute data reduction rate β to examine characteristics of data and queries. Figure 4: Comparison of Unlimited storage nodes Storage nodes vs. Total Energy cost with other Schemes Fig.4 indicates the comparison of unlimited storage nodes with the storage node vs. total energy cost and other schemes. The xgraph values are taken from observations made from Algorithm 1.Where the xgraph of unlimited storage nodes is indicated as red color. Figure 3: Comparison of Unlimited storage nodes Time vs. Avg Energy cost with other schemes Figure 5: Comparison of Unlimited storage nodes Time vs. Jitter with other schemes 15

6 Fig.5 indicates the comparison of unlimited storage nodes with Time vs. Jitter and other schemes. The xgraph values are taken from observations made from Algorithm 1.Where the graph of unlimited storage nodes is indicated as red color. 6. CONCLUSION AND FUTURE WORK This paper considers the storage node placement problem in a sensor network. This paper introduces unlimited number of storage nodes in sensor network release the cost of sending all the raw data to a central place. In this paper, first examine how to place unlimited number of storage nodes to save energy for data collection and data query. This new model is much more simplified and implementable. We have tested it on different data sets available on internet using network simulator software. Our Future work includes Evaluation of limited number of storage nodes in sensor network to optimize query reply in a sensor network and to solve the storage node placement problem in terms of other performance metrics. 7. REFERENCES [1] C. Intanagonwiwat, R. Govindan, and D. Estrin. rected diffusion: a scalable and robust Communication paradigm for sensor networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 56 67, New York, NY, USA, ACM Press [2] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Netw., 11(1):2 16, [3] S. Madden, M. J. Franklin, J. M. Hellerstein,and W.Hong TAG: a tiny aggregation service for ad-hoc sensor networks.sigops Opererating System Review, 36(SI):131146,2002 [4] J. Newsome and D. Song. GEM: graph embedding for routing and data-centric storage in sensor networks without geographic information. In Proceedings of the 1st international conference on Embedded networked sensor systems, pages 76 88, New York, NY, USA, 2003.ACM Press. [5] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu. Data-centric storage in sensornets with GHT, a geographic hash table. Mobile Networks and Applications, 8(4): , [6] S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin. Data-centric storage in sensornets. SIGCOMM Computer Communication Review, 33(1): , [7] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan.Energy-efficient Communication Protocols for Wireless Microsensor Networks. In International Conference on System Sciences, Maui, HI, January [8] P. Desnoyers, D. Ganesan, H. Li, M. Li, and P. Shenoy. PRESTO: A predictive storage architecture for sensor networks. In Tenth Workshop on Hot Topics in Operating System, [9] P. Gupta and P. R. Kumar. The capacity of wireless networks IEEE Transactions on Information Theory, IT- 46(2): March [10] D. Ganesan, D. Estrin, and J. Heidemann. Dimensions: why do we need a new data handling architecture for sensor networks?sigcomm Comput. Commun. Rev., 33(1): , [11] E. J. Duarte-Melo and M. Liu. Data-gathering wireless Sensor networks: organization and capacity. Computer Networks (COMNET), 43(4): , v IJCA TM : 16

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

Routing and Transport in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com

Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com ABSTRACT We proposed an authentication mechanism in the wireless sensor

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks

Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks August 26, 2002 TR CS-02-12 Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks Konstantinos Kalpakis 1,2, Koustuv Dasgupta 1, and Parag Namjoshi 1 Computer Science and Electrical

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Wireless Sensor Network: Improving the Network Energy Consumption

Wireless Sensor Network: Improving the Network Energy Consumption Wireless Sensor Network: Improving the Network Energy Consumption Ingrid Teixeira, José Ferreira de Rezende and Aloysio de Castro P. Pedroza Abstract-- In a remote sensor application it is desirable that

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Design of a Web-based Application for Wireless Sensor Networks

Design of a Web-based Application for Wireless Sensor Networks Design of a Web-based Application for Wireless Sensor Networks Sajid Hussain, Nick Schofield, and Abdul W. Matin Jodrey School of Computer Science, Acadia University Wolfville, Nova Scotia, Canada {Sajid.Hussain,

More information

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,

More information

Using Virtual Markets to Program Global Behavior in Sensor Networks

Using Virtual Markets to Program Global Behavior in Sensor Networks Using Virtual Markets to Program Global Behavior in Sensor Networks Geoff Mainland, Laura Kang, Sebastien Lahaie, David C. Parkes, and Matt Welsh Division of Engineering and Applied Sciences Harvard University

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Coverage Related Issues in Networks

Coverage Related Issues in Networks Coverage Related Issues in Networks Marida Dossena* 1 1 Department of Information Sciences, University of Naples Federico II, Napoli, Italy Email: marida.dossena@libero.it Abstract- Wireless sensor networks

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Monitoring Large-Scale Wireless Sensor Networks

Monitoring Large-Scale Wireless Sensor Networks Monitoring Large-Scale Wireless Sensor Networks using Epidemic Protocols Daniela Gavidia, Spyros Voulgaris, Maarten van Steen Vrije Universiteit Amsterdam Faculty of Science Department of Computer Science

More information

THIS: THreshold security for Information aggregation in Sensor networks

THIS: THreshold security for Information aggregation in Sensor networks THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Towards a Sensor Network Architecture: Lowering the Waistline

Towards a Sensor Network Architecture: Lowering the Waistline Towards a Sensor Network Architecture: Lowering the Waistline David Culler, Prabal Dutta, Cheng Tien Ee, Rodrigo Fonseca, Jonathan Hui, Philip Levis, Joseph Polastre, Scott Shenker, Ion Stoica, Gilman

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Query Hotspot Decomposition and Load Balancing

Query Hotspot Decomposition and Load Balancing Load-Balancing Query Hotspots For Next-Generation Sensornets Mohamed Aly Google, Inc. 1600 Amphitheater Pkwy Mountain View, CA 94043 Email: maly@google.com Anandha Gopalan Department of Computer Science

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks

Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, Yan Chen Northwestern University, Evanston IL, USA {yzhao,ychen}@cs.northwestern.edu Sylvia Ratnasamy Intel Research,

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

Data Management Issues in Disconnected Sensor Networks

Data Management Issues in Disconnected Sensor Networks Data Management Issues in Disconnected Sensor Networks Wolfgang Lindner MIT CSAIL wolfgang@csail.mit.edu Samuel Madden MIT CSAIL madden@csail.mit.edu Abstract: The possibility of disconnection is one of

More information

Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks

Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks , pp. 1-8 http://dx.doi.org/10.14257/ijsacs.2014.2.2.01 Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks Sreeram Indraneel 1 and Kurra Raja Sekhara Rao

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant

More information

Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks

Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks Distributed Sensor Networks Volume 212, Article ID 76315, 1 pages doi:1.1155/212/76315 Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks Xingpo Ma, Jianliang

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks

Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks JING DENG Department of Computer Science University of North Carolina at Greensboro The success of Wireless Sensor Networks (WSNs)

More information

A Distributed Monitoring Mechanism for Wireless Sensor Networks

A Distributed Monitoring Mechanism for Wireless Sensor Networks A Distributed Monitoring Mechanism for Wireless Sensor Networks Chih-fan Hsin University of Michigan 131 Beal Avenue, 431EECS Ann Arbor, Michigan 4819 chsin@eecs.umich.edu Mingyan Liu University of Michigan

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Content Delivery Networks. Shaxun Chen April 21, 2009

Content Delivery Networks. Shaxun Chen April 21, 2009 Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

NDSS: A Named Data Storage System

NDSS: A Named Data Storage System NDSS: A Named Data Storage System Shuo Chen, Junwei Cao Research Institute of Information Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University, Beijing 100084,

More information

Providing End-to-end Secure Communications in Wireless Sensor Networks

Providing End-to-end Secure Communications in Wireless Sensor Networks 1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)

More information

The Interoperability of Wireless Sensor Networks

The Interoperability of Wireless Sensor Networks The Interoperability of Wireless Sensor Networks Daniela Ballari, Miguel Angel Manso-Callejo, Monica Wachowicz Technical University of Madrid daniela@topografia.upm.es; m.manso@upm.es; m.wachowicz@topografia.upm.es

More information

How To Share Bandwidth On A Diffserv Network

How To Share Bandwidth On A Diffserv Network Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Defending Wireless Sensor Networks Against Adversarial Localization

Defending Wireless Sensor Networks Against Adversarial Localization Defending Wireless Sensor Networks Against Adversarial Localization Neelanjana Dutta, Abhinav Saxena and Sriram Chellappan Department of Computer Science Missouri University of Science and Technology Rolla,

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

Secure Routing in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Dynamic Data Storage Estimation for Multiple Concurrent Applications Using Probability Distribution Modeling in WSNs

Dynamic Data Storage Estimation for Multiple Concurrent Applications Using Probability Distribution Modeling in WSNs Dynamic Data Storage Estimation for Multiple Concurrent Applications Using Probability Distribution Modeling in WSNs Mo Haghighi Abstract Wireless sensor networks (WSN) have become a mainstream technology

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN S.Taruna 1, Sakshi Shringi 2 1,2 Banasthali Vidyapith, Jaipur, Rajasthan, India ABSTRACT Wireless sensor networks (WSN)

More information

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore

Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,

More information

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References

More information

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network

Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Load Balanced Data Transmission within the Probabilistic Wireless Sensor Network Jyoti P.Desai 1, Prof Abhijit Patil 2 1 Student, ME Computer Engineering, Yadavrao Tasgaonkar college of Engineering and

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks Sangeeta Rao Department of Computer Science Central University of Haryana Mahendergarh, Haryana, India

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Energy Efficient

More information

T task De dissemination and Routing

T task De dissemination and Routing IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY 1 B.Maheswari 2 Dr.S.Karthik 3 Prof. T.Rajendran II nd M.E (CSE) Professor & Head, Department of CSE Assistant Professor,

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information